How proxy servers protect computer networks?
No Answer is Posted For this Question
Be the First to Post Answer
Networking?
On what layer does SMB protocol reside? a. application b. presentation c. session d. transport
Which program will check if sendmail can determine the system's fully-qualified host name ?
Explain sneakernet?
how to set kernal parameters in solaris 10&9?
It is advisable not to use telnet because of security problems. Which program should you use instead ?
Solaris machines more often than not runs routed daemon. routed is the unix equivalent of RIP. It is always run with -q option. Why ? a. q options optimizes the process b. q option uses a default route c. q option only activates itself in the absence of a default router d. q option tells the process not to advertise any routes. It just listens to the RIP udates. That way it does not interfere with router in the subnet.
what is MBR and how will u clear this ?
Which has error correction? (choose all that apply) Connection Oriented Connectionless oriented
In PPP, a protocol frame is used for selecting and configuring the network layer protocol ?
What works at the Data Link layer of the OSI model.
Have you configured an NIS server/client ?